Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3w42-xvwv-qc2q

Опубликовано: 29 янв. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.

An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.

EPSS

Процентиль: 97%
0.32575
Средний

9.8 Critical

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 7.2
nvd
около 4 лет назад

An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.

CVSS3: 8.8
fstec
около 4 лет назад

Уязвимость компонента SetDdns-domain микропрограммного обеспечения IP камеры Reolink RLC-410W, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 97%
0.32575
Средний

9.8 Critical

CVSS3

Дефекты

CWE-78